

DTS Password Availability
DOVES Vulnerability V-00105
DOVES Project
Computer Security Laboratory
Department of Computer Science
University of California at Davis
Description
Brief summary: SQL Server 7.0's DTS
returns the account name and password used
to run a job automatically.
Detailed description: The SQL Server 7.0's Data Transformation Service (DTS)
allows a database administrator to set up a package
to run database actions at regular intervals and specific
times. The  package may need to access data as a particular
user, and may have to supply that user's password
(for example, if sending mail or connecting to an OLE database).
If the administrator does not protect the package with an Owner
password, and an unauthorized user can view the area (Server, Repository,
or file) in which the package is stored,
such a user could query the properties of that package
to view any stored passwords.
Components: Server
Operating system(s): Microsoft SQL Server 6.5, 7.0An attacker can read account names and associated passwords
How to detect: 
- Check that "DTSUI.dll" and "Sqlns.dll"
are both version 7.00.886.
If so, you are not vulnerable.
 - The problem is that the attacker has access to either the
SQL server that is running the package, or the package itself.
This occurs when the following hold:
- The database administrator creating the package to run the
detached job used an account name and password rather than
Windows authentication.
 - The DTS package allows anyone to edit it.
 - The database administrator (SQL Server administrator) allows
Guest access to the SQL Server MSDB database.
 - The SQL Server is registered under an account name and password
rather than under Windows authentication.
 
 
How to fix: There is both a workaround and a fix.
- Install the Microsoft patch and re-encipher the data
in the Protected Store.
- Download the
 patch for the Microsoft SQL Server 7.0 for your architecture
and install them.
 - Enter Explorer and go to the
"Mssql7\Binn" folder.
Replace the existing "DTSUI.dll" and "Sqlns.dll"
files with the versions from the patch.
 
 
 - The workaround involves three parts.
The first two are mandatory, the third highly recommended.
- Save the DTS packages with an Owner password.
This means that only the owner can get access to the
properties.
 - Use Windows NT authentication on the SQL Enterprise Manager.
 - Delete the Guest user from the MSDB
database, and set file access control permissions to
prevent anyone but the owner from accessing the packages.
The former keeps Guests from
accessing packages stored on the Server or the Repository,
and the latter protects packages stored as files.
 
 
Other information: 
Keywords
access control,
SQL,
password,
property
Cataloguing Information
PA Classification: 
RISOS Classification: 
Davis Classification: 
Common Vulnerability Exposure: Microsoft SQL Server allows local users to obtain database passwords
via the Data Transformation Service (DTS) package Properties dialog,
aka the "DTS Password" vulnerability. [CAN-2000-0485]
Exploits
Attacks: See  Doves exploit #105
Related Information
Microsoft Knowledge Base article
 Q264880, FIX: Passwords May Be Retrieved from Enterprise
Manager and from a DTS Package with No Owner Password
Advisories: 
History
Who reported it: Justin Gunther in Bugtraq on May 26, 2000: reported the problem and gave an exploit
Revision #1
- Matt Bishop on 7/31/2000
Initial entry 
Send email to doves@cs.ucdavis.edu
Department of Computer Science
University of California at Davis
One Shields Ave.
Davis, CA 95616-8562
Page created August  28, 2000 at 16:41:46 GMTDove images © 1999-2000 www.barrysclipart.com